BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Italy
1 × South Korea
2 × Canada
4 × USA
Collaborated with:
L.F.Cranor M.K.Reiter R.W.Reeder M.L.Mazurek K.Vaniea R.Shay J.Ligatti D.Walker N.Christin S.Komanduri B.Ur P.F.Klemperer S.M.Segreti Y.Liang N.Gupta H.Takabi K.Bacon K.How H.Strong P.G.Kelley S.Egelman M.Sleeper A.Forget W.Melicher A.L.Durity P.(.Huh J.P.Arsenault J.Bresee I.Ion C.Johns D.Lee J.Olsen B.Salmon G.R.Ganger
Talks about:
control (6) access (6) password (4) polici (4) secur (3) creation (2) system (2) measur (2) effect (2) usabl (2)

Person: Lujo Bauer

DBLP DBLP: Bauer:Lujo

Contributed to:

CHI 20152015
CHI 20142014
CHI 20122012
CHI 20112011
CHI 20102010
CHI 20092009
CHI 20082008
PLDI 20052005

Wrote 11 papers:

CHI-2015-ShayBCCFKMMSU #behaviour #feedback
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior (RS, LB, NC, LFC, AF, SK, MLM, WM, SMS, BU), pp. 2903–2912.
CHI-2014-ShayKDHMSUBCC #question
Can long passwords be secure and usable? (RS, SK, ALD, P(H, MLM, SMS, BU, LB, NC, LFC), pp. 2927–2936.
CHI-2012-KlempererLMSUBCGR #data access #exclamation #using
Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
CHI-2011-KomanduriSKMBCCE #people #policy
Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
CHI-2011-MazurekKSTBC #data access
Exploring reactive access control (MLM, PFK, RS, HT, LB, LFC), pp. 2085–2094.
CHI-2011-ReederBCRV #usability
More than skin deep: measuring effects of the underlying model on access-control system usability (RWR, LB, LFC, MKR, KV), pp. 2065–2074.
CHI-2010-MazurekABGIJLLOSSVBCGR #data access #social
Access control for home data sharing: evaluating social acceptability (MLM, JPA, JB, NG, II, CJ, DL, YL, JO, BS, RS, KV, LB, LFC, GRG, MKR), pp. 645–654.
CHI-2009-BauerCRRV #challenge
Real life challenges in access-control management (LB, LFC, RWR, MKR, KV), pp. 899–908.
CHI-2008-BauerCRRV #case study #flexibility #policy #user study
A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
CHI-2008-ReederBCRBHS #authoring #policy #security #visualisation
Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
PLDI-2005-BauerLW #policy #security
Composing security policies with polymer (LB, JL, DW), pp. 305–314.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.